2,489 research outputs found

    Extension of Tinny Application for Cloud Based Custom Software with Encryption Queue: A Strategy to Protect Data on Cloud

    Get PDF
    Data protection is in your hands, even your data lands in the lap of service providers. Cloud computing is a new and emerging concept in the field of IT. It means do everything over the internet and put burden on the shoulders of cloud's service providers. Individuals or business organizations are hesitant to do their tasks over public networks like internet. They can't leave their sensitive data in the hands of service providers. It is due to lack of confidence and trust on service providers. Protecting customer's sensitive data on cloud is the major issue. Here authors purposed a strategy to protect customer's sensitive data before sending it towards service providers. The strategy consists of a barrier (Encryption Queue) to protect customer's data. With the use of this strategy, encryption procedure will be in the hands of customers themselves. This concept will help to built up customer's trust and will prepare them to shift desktop based applications over the cloud

    Refactoring for Multi-Dimensional Reusability

    Get PDF
    Source code should be simpler, easy to read and easy to understand. This slogan is not only relates to change the existing code for current service, but also has an association with reusability. Refactoring is a best idea for above issues i.e. keeping the code simple and support the emergent design practice. Many refactoring techniques have been produced related to code simplicity and understandability for maintainability & extensibility. Here author enforced to make the method with the division of three sections and each section should have an argument as a signal. Such technique will be the pillar of reusability from many directions

    Exploring Documentation: A Trivial Dimension of RUP

    Get PDF
    The Unified Process (UP) methodology is a commonly used methodology which can be followed by that entire process model where perfectly documented and well defined structure of team is needed, like Rational Unified Process (RUP) model which follows the UP methodology.  During documentation, the defect rate of software can be reduced and software quality can be improved. Quality is the sole objective which is pursued by stakeholders throughout the whole life cycle of software development. Quality is not the outcome of an accident; it is the fruit of the continual labor of devoted professionals. As the size of software increases, it is natural for the number of errors and defects to increase. The Cleanroom Software engineering process is a process for software development. The basic objective of Cleanroom Software engineering is to produce high quality of software emphasizing to increase the level of reliability to its utmost efficiency. Moreover, the Cleanroom process is involved in each and every phase of software development life cycle i.e. planning; measurement; specifying design; verifying code; testing; and certifying to mold the entire engineering discipline that the end product should result ideally in zero defect-rate. Keywords: Cleanroom software Engineering process, Documentation, Defect rate, Rational Unified process, quality and reliability

    Agent for Automating Educational Institutes as a Single Entity: Schools' Coordination System

    Get PDF
    Services and processes require much effort for executing in manual ways. Customized-Service Oriented Architecture is currently a very large source for automating services of different organizations. Educational Institutes and Schools, which are the part of the original nature of man to live, cooperate and grow with others. Transfer of parents becomes a major problem for children education. School's services required a system which can connect all branches on different places to remove transferring problem for a person. SCS (School Coordination System) is a CSOA based application which can provide different services (letter transaction, lecture plane, transfer of student from one branch to other branch with in no time). So student gets feel free after migrating the school. SCS will also provide a medium between parents and school to check the progress of his chil

    IDENTIFICATION OF ACTIVE AND PASSIVE REGIMES OF FISCAL AND MONETARY POLICIES IN PAKISTAN

    Get PDF
    Fiscal and monetary policies are two important macroeconomic policies which work by adopting different policy regimes to achieve the desired objectives. The present study is an endeavor to identify active and passive policy regimes and attempts to reveal the relatively more dominant policy in case of Pakistan. The study by utilizing time series annual data from 1972 to 2022 uses monetary and fiscal policy reaction functions to reveal the overall active or passive behaviors of fiscal and monetary policies. The study further uses recursive estimation technique and empirically estimates the fiscal and monetary policy reaction functions to identify the year-to-year policy regimes adopted by authorities in Pakistan. Money market rate in taken as proxy for monetary while budget deficit as a percent of GDP is taken for fiscal policy. Output gap, inflation rate, debt as a percentage of GDP, and nominal exchange rate are the study variables. The study finds that both policies interact 40 times out of which monetary policy remained active for 29 and passive for 11 times. Similarly, fiscal policy remained active for 30 and passive for 10 times. Both policies remained pro-cyclical for 19 and counter- cyclical for 21 times. Using the max-min and min-max criteria of pay- off matrix, it is found that monetary policy is Pakistan is more dominant policy as compared to fiscal policy. To ensure the increasing effectiveness of both policies, it is recommended that the authorities should adopt the optimal policy mix by working in coordination while formulating the policies

    Selection of Web Services using Service Agent: An optimized way for the selection of Non-functional requirements

    Get PDF
    Web Services provide a promising results and solution according to the needs and requirements with fast & flexible manners for information sharing among different peoples and businesses. The major key issue in research in Web Services is the selection process which is most difficult & cumbersome because the increasing numbers of services that can not meet or fulfill all the non- functional requirements like performance, efficiency, reliability sensitivity etc. moreover for web services selection for Library System, the author suggests a model to select the searching material only related to books in hard copy form, softcopy form, read only and printable from. The Author suggests an agent for the selection of these books from the web. When any body else who wants to search a specific book from the web, then this service agent will show all the web sites where books will be available.  The agent generates a list of books with their all user's needs and Non-functional requirements. On the basis of these non-functional requirements the user can pick the book according to the document provided by service agent. Keywords: Service Agent, Non-functional requirement, Web service

    Cloud Based Dedicated Application for Multiple Organizations: Cloud Computing for All Organizations

    Get PDF
    Desktop applications should be run over the cloud environment. This is the slogan of those organization which are familiar with the cloud computing. Organization's members are not only responsible for smooth running of desktop application but also have a burden of successful running of database server, back & recovery devices, time and cost of human efforts. CBCS (Cloud Based Custom Software) is the solution of such issues. Development companies are responsible for development of CBCS of an organization. Although CBCS is a dedicated service to an organization, but existing CBCS can also dedicate to other organization when development companies will follow the CBDAMO (Cloud Based Dedicated Customized Application for Multiple Organization) technique. This is 6-layer technique which provides a smooth way to development companies for reusing the existing CBCS to new CBCS. Key Words: Cloud Computing, CBCS, DBCS, CBDAMO, Development Companie

    Determinants of Safe Organizational Climate and its Impact on Employee Performance: A Case of Marble Industries Khyber Pakhtunkhwa, Pakistan

    Get PDF
    The purpose of this research paper was to discover different problems and disseminate solutions for creating a safety climate in an organization by minimizing accidents at the workplace through increasing safety awareness among employees. For this purpose, a survey was carried out to collect the data by means of questionnaires from different marble factories situated in industrial areas of Mardan and Nowshera Districts of Khyber Pakhtunkhwa, Pakistan. Total one hundred questionnaires were distributed among the employees, out of which eighty five were returned, which were considered enough for analyzing the data. Data were analyzed though SPSS version 20. The empirical results showed that environmental conditions, safety related policies and programs, organizational climates, and safety communications were significantly affecting safety climate, and safety climate was highly related to the employee’s performance. On the basis of empirical findings of this study, it is concluded that better environmental conditions, safety related policies, organizational climates and safety communications should be ensured and practiced in marble factories situated in industrial zones of Mardan and Nowshera Districts of Khyber Pakhtunkhwa, Pakistan for creating the safety climate in order to enhance the safety related performance of the employees.Â
    • …
    corecore